Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Xiaodong Zuo"'
Autor:
Jiachen Chen, Zhifang Deng, Zheng Jiang, Jin Sun, Fangfang Meng, Xiaodong Zuo, Linkun Wu, Guangqiu Cao, Shijiang Cao
Publikováno v:
Frontiers in Plant Science, Vol 13 (2022)
Successive planting and monoculture, as common forest management methods, are widely used globally, especially in Chinese fir plantations in the subtropical areas of southern China. Although soil fertility depletion and productivity decline caused by
Externí odkaz:
https://doaj.org/article/639255b799f347c0949ddb0712526f2f
Publikováno v:
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
Publikováno v:
ACS Applied Energy Materials. 4:8875-8882
Non-noble metal electrocatalysts have attracted great attention on account of low cost, good stability, and excellent hydrogen evolution performance. One of the most efficient approaches to increas...
Autor:
Xiaodong, Zuo, Zhiyi, Chen, Chengzhi, Guan, Kongfa, Chen, Sanzhao, Song, Guoping, Xiao, Yuepeng, Pang, Jian-Qiang, Wang
Publikováno v:
Materials
Nanoscale perovskite oxides with enhanced electrocatalytic activities have been widely used as oxygen electrodes of reversible solid oxide cells (RSOC). Here, La0.6Sr0.4FeO3−δ (LSF) nanoscale powder is synthesized via a novel molten salt method us
Autor:
Chengzhi Guan, Xiao Guoping, Jianqiang Wang, Kongfa Chen, Zhiyi Chen, Sanzhao Song, Xiaodong Zuo, Yuepeng Pang
Publikováno v:
Materials, Vol 13, Iss 2267, p 2267 (2020)
Materials
Volume 13
Issue 10
Materials
Volume 13
Issue 10
Nanoscale perovskite oxides with enhanced electrocatalytic activities have been widely used as oxygen electrodes of reversible solid oxide cells (RSOC). Here, La0.6Sr0.4FeO3&minus
&delta
(LSF) nanoscale powder is synthesized via a novel mol
&delta
(LSF) nanoscale powder is synthesized via a novel mol
Publikováno v:
Second International Conference on Innovative Computing, Informatio and Control (ICICIC 2007).
In 2002, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks. And they provided a formal proof of security to show its strength against both passive and active adversaries. However, the scheme pre
Publikováno v:
Second International Conference on Innovative Computing, Information & Control (ICICIC 2007); 2007, p610-610, 1p